Research Article
On the Relevance of Using Multi-layered Security in the Opportunistic Internet-of-Things
@INPROCEEDINGS{10.1007/978-3-030-41593-8_2, author={Antoine Bagula and Lutando Ngaqwazai and Claude Kakoko and Olasupo Ajayi}, title={On the Relevance of Using Multi-layered Security in the Opportunistic Internet-of-Things}, proceedings={e-Infrastructure and e-Services for Developing Countries. 11th EAI International Conference, AFRICOMM 2019, Porto-Novo, Benin, December 3--4, 2019, Proceedings}, proceedings_a={AFRICOMM}, year={2020}, month={2}, keywords={Multi-layered security Internet-of-Things Wireless sensor networks Opportunistic networking}, doi={10.1007/978-3-030-41593-8_2} }
- Antoine Bagula
Lutando Ngaqwazai
Claude Kakoko
Olasupo Ajayi
Year: 2020
On the Relevance of Using Multi-layered Security in the Opportunistic Internet-of-Things
AFRICOMM
Springer
DOI: 10.1007/978-3-030-41593-8_2
Abstract
Wireless Sensor Networks (WSNs) have recently gained more importance as key building blocks for the Internet of Things (IoT); a network infrastructure which has greatly increased in number of connected objects with instantaneous communication, data processing and pervasive access to the objects that we manipulate daily. However, WSNs may sometimes need to be deployed in an opportunistic fashion when there is no network with stable power supply available to support the dissemination of the sensor readings from their collection points to a gateway. For such deployments, traditional networking paradigms may fall short to secure the WSNs since most of the well-known security algorithms have been designed for the traditional high quality of service and fully connected networks. Building around some of the security algorithms and protocols which have been developed in the context of Delay Tolerant Networking, this paper presents a multi-layered security model for the opportunistic IoT. The model combines a hash based message authentication code (HMAC) algorithm implemented at the application layer of the IEEE 802.15.4 stack and an Access Control List (ACL) based identity based encryption algorithm used by the IEEE 802.15.4 MAC layer as a new and novel method of signing and authenticating data which is stored and forwarded on an opportunistic Internet of Things (IoT) infrastructure.